Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 9 of 9 by Simon Phipps tagged Hacking

Very interesting move to offer a standard and open way to add features to cars.

Share It With Others!

Very interesting move to offer a standard and open way to add features to cars.

Share It With Others!

While it sounds a little sacrilegious to do this to decent whisky, I do like the idea of the "oak ice cream" and of the "grey dog" from an elderly whisky. The prospect of recombining the best bits of several whiskys is interesting too.

Share It With Others!

This detailed article makes for worrying reading. It details a growing approach to hacking attacks where specific individuals with privileged access to data are targeted for socially engineered attacks and then their computers quietly infested as a gateway to secure systems.

Share It With Others!

Seems the iPad 2 is even harder to repair than its predecessor - iFixit gves it 4 out of 10. Whatever else Apple may be doing for your freedoms, selling you hardware that's destined for anywhere but the landfill is not among them.

Share It With Others!

Bad news here about the DMCA in America being given unwanted and unwarranted further reach, allowing corporations to control their markets - and their customers - more than ever. Also slightly unsettling that the report is from the perspective of a law firm that thinks this is a good thing.

Share It With Others!

Schneier points out that the feature China hacked in GMail was only there because the US government demanded it "for security", and that building trapdoors for use by spooks is an invitation for bad guys to hack them. They are another example of why security through obscurity is an anti-pattern.

Share It With Others!

Deliciously direct and deep paper looks at the assumptions behind our security thinking and confronts them head-on. Still relevant after 4 years, which is good going for anything geeky.

Share It With Others!

"Did she actually think she'd be able to just schmooz her way in there and out social engineer people who audit security for a living?"

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT